IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Steganography and Steganalysis

Steganography and Steganalysis
View Sample PDF
Author(s): Merrill Warkentin (Mississippi State University, USA), Mark B. Schmidt (St. Cloud State University, USA)and Ernst Bekkering (Northeastern State University, USA)
Copyright: 2006
Pages: 8
Source title: Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues
Source Author(s)/Editor(s): Merrill Warkentin (Mississippi State University, USA)and Rayford Vaughn (Mississippi State University, USA)
DOI: 10.4018/978-1-59140-911-3.ch018

Purchase

View Steganography and Steganalysis on the publisher's website for pricing and purchasing information.

Abstract

In the digital environment, steganography has increasingly received attention over the last decade. Steganography, which literally means “covered writing,” includes any process that conceals data or information within other data or conceals the fact that a message is being sent. Though the focus on use of steganography for criminal and terrorist purposes detracts from the potential use for legitimate purposes, the focus in this chapter is on its role as a security threat. The history of stenography as a tool for covert purposes is addressed. Recent technical innovations in computerized steganography are presented, and selected widely available steganography tools are presented. Finally, a brief discussion of the role of steganalysis is presented.

Related Content

Margee Hume, Paul Johnston. © 2017. 19 pages.
Jessy Nair, D. Bhanu Sree Reddy. © 2017. 27 pages.
Joseph R. Muscatello, Diane H. Parente, Matthew Swinarski. © 2017. 19 pages.
Klaus Wölfel. © 2017. 33 pages.
Rui Pedro Marques. © 2017. 21 pages.
Ebru E. Saygili, Arikan Tarik Saygili. © 2017. 17 pages.
Aparna Raman, D. P. Goyal. © 2017. 41 pages.
Body Bottom